Tag: third-party risk management
-
CSA: 5 Big Cybersecurity Laws to Know About Ahead of 2025
Source URL: https://www.schellman.com/blog/cybersecurity/2025-cybersecurity-laws Source: CSA Title: 5 Big Cybersecurity Laws to Know About Ahead of 2025 Feedly Summary: AI Summary and Description: Yes Summary: The text outlines upcoming cybersecurity regulations set to take effect in 2025, emphasizing the need for organizations to prepare adequately to avoid non-compliance penalties. Key regulations include the NIS 2 Directive,…
-
The Register: Cyberattackers stole Microlise staff data following DHL, Serco disruption
Source URL: https://www.theregister.com/2024/11/06/microlise_cyberattack/ Source: The Register Title: Cyberattackers stole Microlise staff data following DHL, Serco disruption Feedly Summary: Experts say incident has ‘all the hallmarks of ransomware’ Telematics tech biz Microlise says an attack that hit its network likely did not expose customer data, although staff aren’t so lucky.… AI Summary and Description: Yes Summary:…
-
The Register: Financial institutions told to get their house in order before the next CrowdStrike strikes
Source URL: https://www.theregister.com/2024/11/02/fca_it_resilience/ Source: The Register Title: Financial institutions told to get their house in order before the next CrowdStrike strikes Feedly Summary: Calls for improvements will soon turn into demands when new rules come into force The UK’s finance regulator is urging all institutions under its remit to better prepare for IT meltdowns like…
-
Cloud Blog: Adapting model risk management for financial institutions in the generative AI era
Source URL: https://cloud.google.com/blog/topics/financial-services/adapting-model-risk-management-in-the-gen-ai-era/ Source: Cloud Blog Title: Adapting model risk management for financial institutions in the generative AI era Feedly Summary: Generative AI (gen AI) promises to usher in an era of transformation for quality, accessibility, efficiency, and compliance in the financial services industry. As with any new technology, it also introduces new complexities and…
-
Hacker News: WiFi suspended at big UK train stations after ‘cybersecurity incident’
Source URL: https://www.theguardian.com/uk-news/2024/sep/26/wifi-suspended-big-uk-train-stations-cybersecurity-incident Source: Hacker News Title: WiFi suspended at big UK train stations after ‘cybersecurity incident’ Feedly Summary: Comments AI Summary and Description: Yes Summary: The text reports on a cybersecurity incident affecting Wifi networks at various UK train stations, resulting in service suspensions and a connection to previous cyber-attacks on Transport for London.…
-
CSA: Securing Machine Credentials: Protecting Access Keys
Source URL: https://cloudsecurityalliance.org/articles/what-are-machine-credentials-and-why-are-they-important-to-secure-in-your-organization Source: CSA Title: Securing Machine Credentials: Protecting Access Keys Feedly Summary: AI Summary and Description: Yes Summary: The text emphasizes the significance of securing Machine Credentials, which are digital access keys for non-human identities in organizational environments. It outlines their potential vulnerabilities, the consequences of compromised credentials, and strategies for securing them,…